™.. Random - Online Linux Manual PageSection : 3
Updated : 2007-05-20
Source : perl v5.10.1
Note : User Contributed Perl Documentation
NAMECrypt::OpenSSL::RSA − RSA encoding and decoding, using the openSSL libraries Crypt::OpenSSL::Random − Routines for accessing the OpenSSL pseudo−random number generator
SYNOPSIS use Crypt::OpenSSL::Random;
Crypt::OpenSSL::Random::random_seed($good_random_data);
Crypt::OpenSSL::Random::random_egd("/tmp/entropy");
Crypt::OpenSSL::Random::random_status() or
die "Unable to sufficiently seed the random number generator".
my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10);
my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10);
DESCRIPTIONCrypt::OpenSSL::Random provides the ability to seed and query the OpenSSL library's pseudo-random number generator
EXPORTNone by default.
Static Methodsrandom_bytes This function, returns a specified number of cryptographically strong pseudo-random bytes from the PRNG. If the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence, then a false value is returned. random_pseudo_bytes This function, is similar to c<random_bytes>, but the resulting sequence of bytes are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. random_seed This function seeds the PRNG with a supplied string of bytes. It returns true if the PRNG has sufficient seeding. Note: calling this function with non-random bytes is of limited value at best! random_egd This function seeds the PRNG with data from the specified entropy gathering daemon. Returns the number of bytes read from the daemon on succes, or −1 if not enough bytes were read, or if the connection to the daemon failed. random_status This function returns true if the PRNG has sufficient seeding.
BUGSBecause of the internal workings of OpenSSL's random library, the pseudo-random number generator (PRNG) accessed by Crypt::OpenSSL::Random will be different than the one accessed by any other perl module. Hence, to use a module such as Crypt::OpenSSL::Random, you will need to seed the PRNG used there from one used here. This class is still advantageous, however, as it centralizes other methods, such as random_egd, in one place.
AUTHORIan Robertson, iroberts@cpan.com
SEE ALSOperl (1), rand (3), RAND_add (3), RAND_egd (3), RAND_bytes (3).
POD ERRORSHey! The above document had some coding errors, which are explained below: Around line 62: '=item' outside of any '=over' Around line 93: You forgot a '=back' before '=head1' 0
Johanes Gumabo
Data Size : 8,766 byte
man-Crypt::OpenSSL::Random.3pmBuild : 2024-12-05, 20:55 :
Visitor Screen : x
Visitor Counter ( page / site ) : 5 / 180,724
Visitor ID : :
Visitor IP : 18.118.144.239 :
Visitor Provider : AMAZON-02 :
Provider Position ( lat x lon ) : 39.962500 x -83.006100 : x
Provider Accuracy Radius ( km ) : 1000 :
Provider City : Columbus :
Provider Province : Ohio , : ,
Provider Country : United States :
Provider Continent : North America :
Visitor Recorder : Version :
Visitor Recorder : Library :
Online Linux Manual Page : Version : Online Linux Manual Page - Fedora.40 - march=x86-64 - mtune=generic - 24.12.05
Online Linux Manual Page : Library : lib_c - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Online Linux Manual Page : Library : lib_m - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Data Base : Version : Online Linux Manual Page Database - 24.04.13 - march=x86-64 - mtune=generic - fedora-38
Data Base : Library : lib_c - 23.02.07 - march=x86-64 - mtune=generic - fedora.36
Very long time ago, I have the best tutor, Wenzel Svojanovsky . If someone knows the email address of Wenzel Svojanovsky , please send an email to johanes_gumabo@yahoo.co.id .
If error, please print screen and send to johanes_gumabo@yahoo.co.id
Under development. Support me via PayPal.
ERROR : Need New Coding : (parse_manual_page_|249|Crypt::OpenSSL::Random.3pm|36/37|el══─{─══.|.el══─{─══. ds -- \|\(em\|
) (htmlprn|149|Crypt::OpenSSL::Random.3pm|36/37|.el══─{─══. ds -- — |.el══─{─══. ds -- \|\(em\|
) (parse_manual_page_|249|Crypt::OpenSSL::Random.3pm|41|br══─}─══|'br══─}─══
) (htmlprn|149|Crypt::OpenSSL::Random.3pm|41|'br══─}─══ |'br══─}─══
) (rof_nr_x|149|Crypt::OpenSSL::Random.3pm|51/52|\nF|.ie \nF ══─{─══. de IX
) (rof_unit_scale_px|41|Crypt::OpenSSL::Random.3pm|51/52|F|.ie \nF ══─{─══. de IX
) (rof_if|19|Crypt::OpenSSL::Random.3pm|51/52|\nF|.ie \nF ══─{─══. de IX
) (htmlprn|149|Crypt::OpenSSL::Random.3pm|51/52|.ie \nF ══─{─══. de IX|.ie \nF ══─{─══. de IX
) (rof_escape_sequence|91|Crypt::OpenSSL::Random.3pm|53|\$1\t\\n%\t"\\$2" |. tm Index:\\$1\t\\n%\t"\\$2"
) (parse_manual_page_|249|Crypt::OpenSSL::Random.3pm|57|══─}─══|.══─}─══
) (htmlprn|149|Crypt::OpenSSL::Random.3pm|57|.══─}─══ |.══─}─══
)